| Lesson 3 | Security standards |
| Objective | Security Standards currently being used |
A practical map from high-level security services authentication, access control, confidentiality, integrity, and non-repudiation—to the modern standards and mechanisms that make them real.
Proves an entity is who (or what) it claims to be. Typical implementations include passwords with MFA, passkeys/FIDO2, client certificates, or federated identities (OIDC/SAML).
Grants or denies actions on resources after authentication—e.g., role-based (RBAC), attribute-based (ABAC), or policy-based (OPA). Apply least privilege and separation of duties.
Prevents unauthorized disclosure. Use strong, modern cryptography (e.g., AES-GCM for data at rest and in transit; TLS 1.2+ with modern ciphers). DES is obsolete; use AES and SHA-256+ for hashing.
Prevents undetected alteration. Use message authentication codes (e.g., HMAC-SHA-256), digital signatures (Ed25519/ECDSA), checksums, and signed artifacts.
Prevents a party from denying an action. Achieved through digital signatures, trusted timestamps, logs with tamper-evidence, and PKI-backed identities.
Security frameworks translate the “what” into repeatable “how”. Commonly used standards include:
Map each service to controls from these frameworks to get coverage you can audit, measure, and improve.
Header checksums protect routing/metadata; payload checksums (or MACs) protect content. Using both enables precise error handling and integrity guarantees during transport.
Internal-link health: Our latest crawl recorded
shortestClicksFromHome = 2147483647 for this page—effectively “no discovered path from the homepage.”
Action items: ensure presence in sitemap.xml, add contextual internal links from Module 1/3 index pages,
and verify the page isn’t excluded by robots.txt.